Resubmissions

01-04-2023 15:00

230401-sdfwcacb3v 1

01-04-2023 14:59

230401-sc7mnscb3s 1

01-04-2023 14:56

230401-sbgpvsaf95 6

01-04-2023 14:53

230401-r9pmpaca9t 7

01-04-2023 14:50

230401-r73rjaca8t 6

01-04-2023 14:48

230401-r6gsnsca7s 1

01-04-2023 14:45

230401-r4v8aaca6w 8

01-04-2023 14:42

230401-r24rmsaf49 8

01-04-2023 14:39

230401-r1h4jsca4s 1

01-04-2023 14:36

230401-ryy2zsaf34 1

Analysis

  • max time kernel
    67s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 14:53

General

  • Target

    https://we.tl/t-VCeNt9Cn60

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 7 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Drops file in System32 directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 13 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://we.tl/t-VCeNt9Cn60
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2304
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2304 CREDAT:17410 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2352
  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.0.482085697\2001413956" -parentBuildID 20221007134813 -prefsHandle 1768 -prefMapHandle 1812 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b7073d6d-36d4-48ea-a661-86319174b2ce} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 1908 266670f8358 gpu
    1⤵
      PID:5088
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.1.309249737\659982495" -parentBuildID 20221007134813 -prefsHandle 2296 -prefMapHandle 2292 -prefsLen 20926 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65b27920-4a9e-4113-9d9f-4314fc55f3b0} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 2308 2665a172858 socket
      1⤵
        PID:5028
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.2.1973604181\1996981613" -childID 1 -isForBrowser -prefsHandle 2944 -prefMapHandle 2776 -prefsLen 21074 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6ec49f2-a1f8-48e1-a2c3-bb6888f2a918} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 2952 2666ac12f58 tab
        1⤵
          PID:1060
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.3.915934179\940271151" -childID 2 -isForBrowser -prefsHandle 3252 -prefMapHandle 3332 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {26937a3a-2e42-49dc-80c1-317f3945f95e} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 2336 2665a168158 tab
          1⤵
            PID:4176
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.4.858983336\434329375" -childID 3 -isForBrowser -prefsHandle 4088 -prefMapHandle 4084 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c6338293-abae-4a68-999a-203c3e097783} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 4104 2666bb5fb58 tab
            1⤵
              PID:1312
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.6.750284489\78012982" -childID 5 -isForBrowser -prefsHandle 5028 -prefMapHandle 5032 -prefsLen 26738 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1e693eb-a7ac-4ba3-9f6a-42d8a9f815b1} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 5020 2666db56058 tab
              1⤵
                PID:1168
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.5.732240198\708339056" -childID 4 -isForBrowser -prefsHandle 4972 -prefMapHandle 4956 -prefsLen 26738 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8d6811f5-b51c-4bac-aa18-8bb437724da3} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 4924 2666db55158 tab
                1⤵
                  PID:3412
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.7.851440253\1503668204" -childID 6 -isForBrowser -prefsHandle 5308 -prefMapHandle 5304 -prefsLen 26738 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2ac3c02-adef-4df8-90aa-c38461f55359} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 5320 2666db57258 tab
                  1⤵
                    PID:3340
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.8.53572531\1917858032" -childID 7 -isForBrowser -prefsHandle 5664 -prefMapHandle 5660 -prefsLen 26913 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bb4862f-5e1f-4320-b110-b65b4e652149} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 5676 2666fcfd058 tab
                    1⤵
                      PID:3416
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4840.9.1354291416\1711200679" -childID 8 -isForBrowser -prefsHandle 3152 -prefMapHandle 2928 -prefsLen 26930 -prefMapSize 232675 -jsInitHandle 1500 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d9108eea-b198-4509-b1b2-c6b3fbbf7a6c} 4840 "\\.\pipe\gecko-crash-server-pipe.4840" 2908 2666e038d58 tab
                      1⤵
                        PID:648
                      • C:\Windows\System32\rundll32.exe
                        C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                        1⤵
                          PID:5460
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.bat" "
                          1⤵
                          • Drops file in System32 directory
                          • Suspicious use of WriteProcessMemory
                          PID:5624
                          • C:\Windows\system32\cscript.exe
                            cscript x.js
                            2⤵
                            • Drops file in System32 directory
                            PID:4816
                          • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                            "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
                            2⤵
                            • Checks computer location settings
                            • Executes dropped EXE
                            • Suspicious use of WriteProcessMemory
                            PID:1448
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5408
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:2180
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5436
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:5460
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                              3⤵
                              • Executes dropped EXE
                              • Suspicious behavior: EnumeratesProcesses
                              PID:4468
                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
                              3⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Writes to the Master Boot Record (MBR)
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2656
                              • C:\Windows\SysWOW64\notepad.exe
                                "C:\Windows\System32\notepad.exe" \note.txt
                                4⤵
                                  PID:5584
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=mcafee+vs+norton
                                  4⤵
                                    PID:6120
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x114,0x118,0x11c,0xf8,0x120,0x7ff9575646f8,0x7ff957564708,0x7ff957564718
                                      5⤵
                                        PID:6140
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2268 /prefetch:3
                                        5⤵
                                          PID:1820
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2208 /prefetch:2
                                          5⤵
                                            PID:420
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2848 /prefetch:8
                                            5⤵
                                              PID:4688
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3524 /prefetch:1
                                              5⤵
                                                PID:3300
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3512 /prefetch:1
                                                5⤵
                                                  PID:2456
                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5252 /prefetch:1
                                                  5⤵
                                                    PID:5720
                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3652 /prefetch:1
                                                    5⤵
                                                      PID:5276
                                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5824 /prefetch:1
                                                      5⤵
                                                        PID:2484
                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5784 /prefetch:1
                                                        5⤵
                                                          PID:1800
                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5288 /prefetch:1
                                                          5⤵
                                                            PID:4456
                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6208 /prefetch:1
                                                            5⤵
                                                              PID:3708
                                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2712 /prefetch:1
                                                              5⤵
                                                                PID:4668
                                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2988 /prefetch:1
                                                                5⤵
                                                                  PID:4856
                                                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3664 /prefetch:1
                                                                  5⤵
                                                                    PID:3300
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2192,1842897360850668066,18205050990502077122,131072 --disable-gpu-compositing --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6452 /prefetch:1
                                                                    5⤵
                                                                      PID:5420
                                                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=how+to+get+money
                                                                    4⤵
                                                                      PID:5272
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x118,0x11c,0x120,0xf4,0x124,0x7ff9575646f8,0x7ff957564708,0x7ff957564718
                                                                        5⤵
                                                                          PID:2084
                                                                • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                  "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe"
                                                                  1⤵
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:5820
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /watchdog
                                                                    2⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5864
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /watchdog
                                                                    2⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5880
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /watchdog
                                                                    2⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5900
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /watchdog
                                                                    2⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:5924
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /watchdog
                                                                    2⤵
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:4632
                                                                  • C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe
                                                                    "C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.exe" /main
                                                                    2⤵
                                                                    • Writes to the Master Boot Record (MBR)
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:5968
                                                                    • C:\Windows\SysWOW64\notepad.exe
                                                                      "C:\Windows\System32\notepad.exe" \note.txt
                                                                      3⤵
                                                                        PID:6020
                                                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://google.co.ck/search?q=how+2+remove+a+virus
                                                                        3⤵
                                                                          PID:2468
                                                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x104,0x94,0x7ff9575646f8,0x7ff957564708,0x7ff957564718
                                                                            4⤵
                                                                              PID:2960
                                                                          • C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe
                                                                            "C:\Program Files (x86)\Windows NT\Accessories\wordpad.exe"
                                                                            3⤵
                                                                              PID:6532
                                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                                          1⤵
                                                                            PID:5312
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp1_MEMZ 3.0 (1).zip\MEMZ 3.0\MEMZ.bat" "
                                                                            1⤵
                                                                              PID:4904
                                                                              • C:\Windows\system32\cscript.exe
                                                                                cscript x.js
                                                                                2⤵
                                                                                  PID:2352
                                                                                • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                  "C:\Users\Admin\AppData\Roaming\MEMZ.exe"
                                                                                  2⤵
                                                                                    PID:2452
                                                                                    • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                      "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                                                                                      3⤵
                                                                                        PID:5696
                                                                                      • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                        "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                                                                                        3⤵
                                                                                          PID:3456
                                                                                        • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                          "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                                                                                          3⤵
                                                                                            PID:4684
                                                                                          • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                                                                                            3⤵
                                                                                              PID:5516
                                                                                            • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                              "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /watchdog
                                                                                              3⤵
                                                                                                PID:216
                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                "C:\Users\Admin\AppData\Roaming\MEMZ.exe" /main
                                                                                                3⤵
                                                                                                  PID:5332
                                                                                                  • C:\Windows\SysWOW64\notepad.exe
                                                                                                    "C:\Windows\System32\notepad.exe" \note.txt
                                                                                                    4⤵
                                                                                                      PID:5744

                                                                                              Network

                                                                                              MITRE ATT&CK Matrix ATT&CK v6

                                                                                              Persistence

                                                                                              Bootkit

                                                                                              1
                                                                                              T1067

                                                                                              Defense Evasion

                                                                                              Modify Registry

                                                                                              1
                                                                                              T1112

                                                                                              Discovery

                                                                                              Query Registry

                                                                                              1
                                                                                              T1012

                                                                                              System Information Discovery

                                                                                              2
                                                                                              T1082

                                                                                              Command and Control

                                                                                              Web Service

                                                                                              1
                                                                                              T1102

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                462f3c1360a4b5e319363930bc4806f6

                                                                                                SHA1

                                                                                                9ba5e43d833c284b89519423f6b6dab5a859a8d0

                                                                                                SHA256

                                                                                                fec64069c72a8d223ed89a816501b3950f5e4f5dd88f289a923c5f961d259f85

                                                                                                SHA512

                                                                                                5584ef75dfb8a1907c071a194fa78f56d10d1555948dffb8afcacaaa2645fd9d842a923437d0e94fad1d1919dcef5b25bf065863405c8d2a28216df27c87a417

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                d2642245b1e4572ba7d7cd13a0675bb8

                                                                                                SHA1

                                                                                                96456510884685146d3fa2e19202fd2035d64833

                                                                                                SHA256

                                                                                                3763676934b31fe2e3078256adb25b01fdf899db6616b6b41dff3062b68e20a1

                                                                                                SHA512

                                                                                                99e35f5eefc1e654ecfcf0493ccc02475ca679d3527293f35c3adea66879e21575ab037bec77775915ec42ac53e30416c3928bc3c57910ce02f3addd880392e9

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                014c9ce3e520f19a8bba679c7296f8c0

                                                                                                SHA1

                                                                                                dea10f30a0c313c5c9e23e45b21ed5c5e02624b9

                                                                                                SHA256

                                                                                                8d37ac330684d1c59dfd971e5e5b8b1923e4d127262a8ed5159896358c52a295

                                                                                                SHA512

                                                                                                d473297d1104abedeb488e33d49b6d563d0c8e002dad29abdcd7b7735e14d1b32c36bd057421a52befdbbbce06260c58530ffd38aad4878af74a722e664f050f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
                                                                                                Filesize

                                                                                                152B

                                                                                                MD5

                                                                                                014c9ce3e520f19a8bba679c7296f8c0

                                                                                                SHA1

                                                                                                dea10f30a0c313c5c9e23e45b21ed5c5e02624b9

                                                                                                SHA256

                                                                                                8d37ac330684d1c59dfd971e5e5b8b1923e4d127262a8ed5159896358c52a295

                                                                                                SHA512

                                                                                                d473297d1104abedeb488e33d49b6d563d0c8e002dad29abdcd7b7735e14d1b32c36bd057421a52befdbbbce06260c58530ffd38aad4878af74a722e664f050f

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000002
                                                                                                Filesize

                                                                                                20KB

                                                                                                MD5

                                                                                                923a543cc619ea568f91b723d9fb1ef0

                                                                                                SHA1

                                                                                                6f4ade25559645c741d7327c6e16521e43d7e1f9

                                                                                                SHA256

                                                                                                bf7344209edb1be5a2886c425cf6334a102d76cbea1471fd50171e2ee92877cd

                                                                                                SHA512

                                                                                                a4153751761cd67465374828b0514d7773b8c4ed37779d1ecfd4f19be4faa171585c8ee0b4db59b556399d5d2b9809ba87e04d4715e9d090e1f488d02219d555

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000003
                                                                                                Filesize

                                                                                                335KB

                                                                                                MD5

                                                                                                d16190bf118d99210b60b2d11599b537

                                                                                                SHA1

                                                                                                e1f84b876216432f5c96fc06a14b124160295d03

                                                                                                SHA256

                                                                                                aab02755d99a2a8df6fa5cec03a960fb2d6c4bcd6854ea979abd0b4278a6989b

                                                                                                SHA512

                                                                                                5e2b135c2585e143a3620f9f1755700a1b713d202cca7409cdc626bffe697ffa8129145fc11d5a2ff5aa8aefa5f8968d5da053a82b4a071628b6ce4d0b8a8b9e

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000004
                                                                                                Filesize

                                                                                                64KB

                                                                                                MD5

                                                                                                c4f7300442a8f13dddf5c9bd09128727

                                                                                                SHA1

                                                                                                d7c8a30cdfe9027cca42c45f44d569627112ae6c

                                                                                                SHA256

                                                                                                5decc8ac1f3d26152842e44d1aa103c913711168c968c936bb782fb3cac10155

                                                                                                SHA512

                                                                                                3b6ebaff36af22dcc9ae7a7593657b56f99afb242ebeed50d26a33e1e6b0ff31c98ef576b96cf98c277cafc1050fee40b5d4c3fcd730595be756089a980030cf

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000006
                                                                                                Filesize

                                                                                                37KB

                                                                                                MD5

                                                                                                47ae9b25af86702d77c7895ac6f6b57c

                                                                                                SHA1

                                                                                                f56f78729b99247a975620a1103cac3ee9f313a5

                                                                                                SHA256

                                                                                                9bde79a1b0866f68d6baa43f920e971b5feb35a8e0af7ffadc114366f8538224

                                                                                                SHA512

                                                                                                72b5296e3dd1c5b4c42d8c3e4a56693819779167b9f02bc2d5f5a626b519a9cf10bee59846d614c929c42094b65d13039f6024f6cb1c023e740969aaefd060c4

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Cache\f_000008
                                                                                                Filesize

                                                                                                69KB

                                                                                                MD5

                                                                                                f1ae19255876c17b0bd135311fcd78de

                                                                                                SHA1

                                                                                                0cc733b6a91360584abc288ff9cfe5aba68e949c

                                                                                                SHA256

                                                                                                036056b9b7aa1d67b7e509e036cc7c680c19062c16dfb234891e6c0e232369f5

                                                                                                SHA512

                                                                                                f1f6161486e69b6f146900f1c942c62ad4f795198d36a76b109280c8403f822ae182dc8fd146b102263ae241ca7c740704bfbd5c61bf5522bdb5fe554ef8cb53

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Edge Profile.ico
                                                                                                Filesize

                                                                                                70KB

                                                                                                MD5

                                                                                                e5e3377341056643b0494b6842c0b544

                                                                                                SHA1

                                                                                                d53fd8e256ec9d5cef8ef5387872e544a2df9108

                                                                                                SHA256

                                                                                                e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25

                                                                                                SHA512

                                                                                                83f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\CURRENT
                                                                                                Filesize

                                                                                                16B

                                                                                                MD5

                                                                                                46295cac801e5d4857d09837238a6394

                                                                                                SHA1

                                                                                                44e0fa1b517dbf802b18faf0785eeea6ac51594b

                                                                                                SHA256

                                                                                                0f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443

                                                                                                SHA512

                                                                                                8969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Extension State\MANIFEST-000001
                                                                                                Filesize

                                                                                                41B

                                                                                                MD5

                                                                                                5af87dfd673ba2115e2fcf5cfdb727ab

                                                                                                SHA1

                                                                                                d5b5bbf396dc291274584ef71f444f420b6056f1

                                                                                                SHA256

                                                                                                f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4

                                                                                                SHA512

                                                                                                de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Microsoft Edge.lnk
                                                                                                Filesize

                                                                                                2KB

                                                                                                MD5

                                                                                                e246d72f4e89d6d9300b5301e9b27e0e

                                                                                                SHA1

                                                                                                f0aafec270106f8d454a099ebf0f0d710096d9d5

                                                                                                SHA256

                                                                                                f436eebc46ea514ed4fe5ad088199f66f61803844616a73e788a6681c9679d5f

                                                                                                SHA512

                                                                                                ccdcbe3efcc30bc2a25536c72392f1a787fcf4d9fbdab2558f210cb5330fb19fea0f3e60ea724161617c28aea972d604bd61c3c8764cb27235d7aa304c8fa3f9

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State
                                                                                                Filesize

                                                                                                111B

                                                                                                MD5

                                                                                                285252a2f6327d41eab203dc2f402c67

                                                                                                SHA1

                                                                                                acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6

                                                                                                SHA256

                                                                                                5dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026

                                                                                                SHA512

                                                                                                11ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                                                Filesize

                                                                                                4KB

                                                                                                MD5

                                                                                                b2ef2c21144cafad8ed8ae6f085bc91c

                                                                                                SHA1

                                                                                                fcece3048be1ac3767a5aef8d121de9c2d02fcb2

                                                                                                SHA256

                                                                                                549db92a15b72a5b681bc43a8dc6b927b4049c12bd82c362a50ecc422867c482

                                                                                                SHA512

                                                                                                e5b9316349cf6c6da007fd0fd0ac8fd92d29599a3676c0905bc819b32810712cfae1be154650d6ee12810a8cd6caccd09837d4a4f31d0875d995b51942abfe3e

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                                                Filesize

                                                                                                5KB

                                                                                                MD5

                                                                                                125af232f8b1631e88a1697597d12d20

                                                                                                SHA1

                                                                                                dc519327d6f32a5830b1f643bc8a3e3d38dd948c

                                                                                                SHA256

                                                                                                a13eccaca9258168b7e860a6d3407cef0bba76ba317c317a707a1d25a21e15ff

                                                                                                SHA512

                                                                                                d3fc066f393610f27e5649ad577c2fdb76d2b9891caf511ea496ad9069f29268ecfb8be24616e767e1683857fc135e3b8ab665c863c3ea5c3bfb8d670f30ba99

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                1747827ddc90262a0306251890a1f915

                                                                                                SHA1

                                                                                                85b7eaca4e979358d68bba3069d9a319001797e8

                                                                                                SHA256

                                                                                                ed4e4b1eba34a2fe4baf180908eb68ddb68b02b5a5cd8a0b412dec4de2625690

                                                                                                SHA512

                                                                                                df8d24ee5bcc4156e906baf817e42dd385bc5ee3cf544c6d92f91e9412e706e99a8d76d343023e6b983785f1fddf2b3d7db42397357d07709b049df39ac72cb4

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
                                                                                                Filesize

                                                                                                6KB

                                                                                                MD5

                                                                                                41469b482c14d020b5e9fa0eea0b5bcb

                                                                                                SHA1

                                                                                                0d36f70c4148fb81709eaaf0c693f97b32c62d36

                                                                                                SHA256

                                                                                                e5d0627e70518df14010289284c8c343a84a4ed73fe303ede1c58e85dddbf2fb

                                                                                                SHA512

                                                                                                c29e37fe8b9aa3e0b23dff7e48e58b07e3dcdce0ae3cc723dd4ea243fb8328ffabf5a168e92ff30566ca7770e9c743b4647f59c111767bef19b5131efd152596

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure Preferences
                                                                                                Filesize

                                                                                                24KB

                                                                                                MD5

                                                                                                130644a5f79b27202a13879460f2c31a

                                                                                                SHA1

                                                                                                29e213847a017531e849139c7449bce6b39cb2fa

                                                                                                SHA256

                                                                                                1306a93179e1eaf354d9daa6043ae8ffb37b76a1d1396e7b8df671485582bcd1

                                                                                                SHA512

                                                                                                fbc8606bf988cf0a6dea28c16d4394c9b1e47f6b68256132b5c85caf1ec7b516c0e3d33034db275adf267d5a84af2854f50bd38a9ed5e86eb392144c63252e01

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                                                                                Filesize

                                                                                                368B

                                                                                                MD5

                                                                                                345137bd6a510aea5d67280de9d5ac2a

                                                                                                SHA1

                                                                                                b5fcb7bbd96ab60fa5d7915e61f44c3d518d79a4

                                                                                                SHA256

                                                                                                5487b82d495d3f0f8db6aa0928533df5619e3a078f6d899b41f9d14c4a8c5559

                                                                                                SHA512

                                                                                                2c9fce2062793c601318e4580a44418b068d4cc25bc15491df13699a053bdf8aaba6490bcdb1455784776cc29464e1feed35aa0e5e82e02f6e29430c96f094e0

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity
                                                                                                Filesize

                                                                                                370B

                                                                                                MD5

                                                                                                482f597d4ee826775a995bb80c7b56d8

                                                                                                SHA1

                                                                                                02badc5b6c081b72a52bc6bf9630c7ace04ad7dd

                                                                                                SHA256

                                                                                                1dfc4e64c3f4f6d1a59299d4aa7f3214e9ac63e1d766e7c1cffd353dc09b810b

                                                                                                SHA512

                                                                                                8275f35503a79f94389f2bb7c0fd7c482968e0613a264d07982c085221fa83bc64193bd12874602722b192a6bc7a7040bf6e5dc005125faf17046f81976ead31

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\TransportSecurity~RFe58a321.TMP
                                                                                                Filesize

                                                                                                202B

                                                                                                MD5

                                                                                                43cd95c819edd7f82cfa0188c2a5a83d

                                                                                                SHA1

                                                                                                f53b7cf4ed5feed608278c8a2a714cd650ef8ec0

                                                                                                SHA256

                                                                                                4471473f27578e38ea1848824d04af3e78104536a030ca4e0317b51f956bdb90

                                                                                                SHA512

                                                                                                2918bc9f599fde52a4f001d3108e6112b48bdf32473756cbeebaa23fac1ecde85ebb155a92d2ee3a31095088dbc6f5c9e8b85363369121b2525c3f823dcef739

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                                                                Filesize

                                                                                                9KB

                                                                                                MD5

                                                                                                dd9b22fd1a1c90b6f98afe323e32e6f0

                                                                                                SHA1

                                                                                                bd1e8673ac3a27e452c6d3041b9a6e21d09f2f21

                                                                                                SHA256

                                                                                                eb7d5daf1a4aa6b67997e8c2fc55076773c1a63b0067ac40786086059ff39ace

                                                                                                SHA512

                                                                                                daa463968def0439b73ab1c71c434fc29fdc7df78c96b0f7a59f7ce6bb1b0236030153733ae7948d89a9412b053c68b3826284d4607dad500ba26521f8596d4a

                                                                                              • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                0476b535af83e072b529ad1fa640e35d

                                                                                                SHA1

                                                                                                8649b8bf4a442b2e1c7caa57d0313d15a7e5e440

                                                                                                SHA256

                                                                                                7b690759fbd12eec44e68cdfd89fb0a99022b8fbd24bdfe16fab400d67ba2efd

                                                                                                SHA512

                                                                                                5adb0254ffbe6a2b9dd6f36eb0f45c7846d2019f8a985d77d565270acb15f0cb04ef6fc1073fdc39726beac4d435c92f161764b57f94dac625435e81455a073a

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Users\Admin\AppData\Roaming\MEMZ.exe
                                                                                                Filesize

                                                                                                12KB

                                                                                                MD5

                                                                                                a7bcf7ea8e9f3f36ebfb85b823e39d91

                                                                                                SHA1

                                                                                                761168201520c199dba68add3a607922d8d4a86e

                                                                                                SHA256

                                                                                                3ff64f10603f0330fa2386ff99471ca789391ace969bd0ec1c1b8ce1b4a6db42

                                                                                                SHA512

                                                                                                89923b669d31e590189fd06619bf27e47c5a47e82be6ae71fdb1b9b3b30b06fb7ca8ffed6d5c41ac410a367f2eb07589291e95a2644877d6bffd52775a5b1523

                                                                                              • C:\Windows\System32\x
                                                                                                Filesize

                                                                                                4KB

                                                                                                MD5

                                                                                                b6873c6cbfc8482c7f0e2dcb77fb7f12

                                                                                                SHA1

                                                                                                844b14037e1f90973a04593785dc88dfca517673

                                                                                                SHA256

                                                                                                0a0cad82d9284ccc3c07de323b76ee2d1c0b328bd2ce59073ed5ac4eb7609bd1

                                                                                                SHA512

                                                                                                f3aa3d46d970db574113f40f489ff8a5f041606e79c4ab02301b283c66ff05732be4c5edc1cf4a851da9fbaaa2f296b97fc1135210966a0e2dfc3763398dfcaf

                                                                                              • C:\Windows\System32\z.zip
                                                                                                Filesize

                                                                                                7KB

                                                                                                MD5

                                                                                                cf0c19ef6909e5c1f10c8460ba9299d8

                                                                                                SHA1

                                                                                                875b575c124acfc1a4a21c1e05acb9690e50b880

                                                                                                SHA256

                                                                                                abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776

                                                                                                SHA512

                                                                                                d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f

                                                                                              • C:\Windows\system32\x
                                                                                                Filesize

                                                                                                10KB

                                                                                                MD5

                                                                                                fc59b7d2eb1edbb9c8cb9eb08115a98e

                                                                                                SHA1

                                                                                                90a6479ce14f8548df54c434c0a524e25efd9d17

                                                                                                SHA256

                                                                                                a05b9be9dd87492f265094146e18d628744c6b09c0e7efaabf228a9f1091a279

                                                                                                SHA512

                                                                                                3392cfc0dbddb37932e76da5a49f4e010a49aaa863c882b85cccab676cd458cfc8f880d8a0e0dc7581175f447e6b0a002da1591ecd14756650bb74996eacd2b1

                                                                                              • C:\Windows\system32\x.js
                                                                                                Filesize

                                                                                                448B

                                                                                                MD5

                                                                                                8eec8704d2a7bc80b95b7460c06f4854

                                                                                                SHA1

                                                                                                1b34585c1fa7ec0bd0505478ac9dbb8b8d19f326

                                                                                                SHA256

                                                                                                aa01b8864b43e92077a106ed3d4656a511f3ba1910fba40c78a32ee6a621d596

                                                                                                SHA512

                                                                                                e274b92810e9a30627a65f87448d784967a2fcfbf49858cbe6ccb841f09e0f53fde253ecc1ea0c7de491d8cc56a6cf8c79d1b7c657e72928cfb0479d11035210

                                                                                              • C:\Windows\system32\z.zip
                                                                                                Filesize

                                                                                                7KB

                                                                                                MD5

                                                                                                cf0c19ef6909e5c1f10c8460ba9299d8

                                                                                                SHA1

                                                                                                875b575c124acfc1a4a21c1e05acb9690e50b880

                                                                                                SHA256

                                                                                                abb834ebd4b7d7f8ddf545976818f41b3cb51d2b895038a56457616d3a2c6776

                                                                                                SHA512

                                                                                                d930a022a373c283f35d103e277487c2034a0b0814913b8f6ec695b45e20528667aa830eeab58e4483d523bd6a755a16a5379095cb137db6c91909a545a19a2f

                                                                                              • C:\note.txt
                                                                                                Filesize

                                                                                                218B

                                                                                                MD5

                                                                                                afa6955439b8d516721231029fb9ca1b

                                                                                                SHA1

                                                                                                087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                                                                                SHA256

                                                                                                8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                                                                                SHA512

                                                                                                5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

                                                                                              • C:\note.txt
                                                                                                Filesize

                                                                                                218B

                                                                                                MD5

                                                                                                afa6955439b8d516721231029fb9ca1b

                                                                                                SHA1

                                                                                                087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                                                                                SHA256

                                                                                                8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                                                                                SHA512

                                                                                                5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

                                                                                              • C:\note.txt
                                                                                                Filesize

                                                                                                218B

                                                                                                MD5

                                                                                                afa6955439b8d516721231029fb9ca1b

                                                                                                SHA1

                                                                                                087a043cc123c0c0df2ffadcf8e71e3ac86bbae9

                                                                                                SHA256

                                                                                                8e9f20f6864c66576536c0b866c6ffdcf11397db67fe120e972e244c3c022270

                                                                                                SHA512

                                                                                                5da21a31fbc4e8250dffed30f66b896bdf007ac91948140334fe36a3f010e1bac3e70a07e9f3eb9da8633189091fd5cadcabbaacd3e01da0fe7ae28a11b3dddf

                                                                                              • \??\pipe\LOCAL\crashpad_6120_ILACUSWGPVNDJVLU
                                                                                                MD5

                                                                                                d41d8cd98f00b204e9800998ecf8427e

                                                                                                SHA1

                                                                                                da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                                                SHA256

                                                                                                e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                                                SHA512

                                                                                                cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e